Virtualization Is Inherently More Secure Cloud Computing

Additionally, with hypervisors such as Xen, guest operating systems run in a lessprivileged Ring 1 and applications in the least-privileged Ring. This explicit virtualization of the physical resources leads to a clear separation between guest and hypervisor, resulting in additional security separation between the two. Different instances running on the same physical machine are isolated from each other via the hypervisor.